February 2010-
SolarWinds Orion Network Performance Monitor (NPM) enables fast, secure, reliable exchange of information, giving the U.S. Marine Expeditionary Force a shared awareness of the battle space, empowering field commanders to make better decisions. This Marine Air-Ground Task Force has found the task of analyzing and managing network performance in tough environments far more efficient through the use of real-time monitoring tools from SolarWinds.

November 2009-
IT departments are charged with doing more with less. That means finding ways to work more efficiently and effectively. The right network management tools can do just that. This ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) white paper is meant to serve as a guide to help decision makers purchasing or re-assessing their existing network management solutions. This paper discusses the challenges and the most widely available solution providers and how these tools can help achieve and deliver ...

August 2010-
Clearing and settlement is an important mechanism in the post-SEPA European payments environment. Prior to SEPA, each country in European Union had a separate local clearing and settlement mechanism. The cross-border payments were time consuming and had to be compliant with the payment laws and regulations of countries of both the originator and beneficiary. After the advent of SEPA, CSM framework has seen lot of revolutionary changes. In the post-SEPA scenario, cross-border fund transfer is ...

September 2010-
Too Much Data, Not Enough Value
It's commonly understood that data not subject to legal or regulatory requirement and without any business value should be disposed, and doing so is getting more important every day:
• 40 percent or more of corporate data is not subject »»to a specific legal duty and has no business value
• Corporate data volume grew by about 50 percent »»last year, while budgets grew by 0 percent
• IT spend averages 3.5 percent of revenues – data »»...

July 2010-
The world of IT and security is changing. We're moving from highly centralized infrastructures to a more federated approach, where relationships are loosely coupled, identities are scattered across systems, and we all live and work in the cloud. But such a move has exposed weaknesses in our IT systems--and prevented us from taking full advantage of all these technological advances. The struggle between the push model of our traditional security infrastructure and the pull model ...

July 2010-
For the past eight years, government agencies have struggled to comply with the requirements of the Federal Information Security Management Act of 2002 (FISMA).
The goal of FISMA is to control information security as it impacts national security and the economic interests of the United States. Compliance obligates each U.S. federal government agency to “develop, document, and implement an agency-wide program to provide information security for the information and information systems that support the operations ...

July 2010-
USB flash drives and other portable devices are valuable tools in the
typical government staffer’s virtual toolkit. These handy devices
allow workers to efficiently accomplish their duties and carry
out their tasks for the public good. But left unchecked, the
use of portable devices can also potentially infect public
systems with malware, inadvertently expose classified
information and/or citizens’ personally identifiable
information (PII), and otherwise breach the
public’s trust.

July 2010-
In the first ten months after a new Massachusetts
identity theft law took effect in late-2007, the Office
of Consumer Affairs and Business Regulation
reported that over 625,000 residents of the Commonwealth
had been directly impacted by a data
breach of their personally identifiable information
(PII). Of these, about 60% were the result of criminal
/ unauthorized acts and the remainder due to
employee error or “sloppy internal handling” of PII.
To help mitigate the negative impacts of ...

July 2010-
Government systems are getting hit on a daily basis by new and ingenious external attacks. Federal, state and municipal agencies, plus government contractors, must find a way to adjust to this evolving threat landscape to prevent these threats from wreaking havoc. It is imperative that government organizations get back to the basics of security and lay a strong security foundation to weather these attacks by proactively addressing their root causes.

June 2010-
Regional government offices can be neglected outposts of IT, but they need reliable resources to serve the residents who come to their agencies for help and guidance. This challenge is felt nationally, as agencies are consolidating some of their operations and the IT that sup¬ports them. But combining branches and their IT technologies without a plan for adapting the IT infrastructure can be difficult, complicated and expensive.

June 2010-
This guide examine various types of customer correspondence, the migration to electronic formats, challenges and best practices, capabilities for a multichannel communications infrastructure, the means for delivering electronic correspondence, and what to look for in a comprehensive correspondence solution.

May 2010-
For government agencies, efficiency is part of the mandate. But in most organizations waste is rampant due to over-provisioned, underutilized and non-optimized resources. Find out why tomorrow's governments will close the technology gap by adopting a converged infrastructure and modular blade servers.

May 2010-
Enterprise Content Management (ECM) has become an important infrastructural technology. Key forces are driving organizations to adopt this strategic, enterprise-level approach to planning and deploying content systems. Organizations implementing an ECM strategy should consider IBM’s ECM offering as it meets the requirements of a comprehensive Enterprise Content Management solution.

May 2010-
Unmanaged employee use of email and the web can subject any organization to potentially costly risks including litigation, regulatory investigations, security breaches, lost productivity, business interruptions, and public embarrassment.

For responsible organizations operating in the age of email and the web, Acceptable Usage Policies (AUPs) are essential business tools. Clearly written and effectively communicated email and web AUPs—supported by employee training and enforced by proven technology solutions—can help employers minimize risks, ...

April 2010-
Novell File Reporter helps organizations more effectively manage network storage by providing administrators the ability to access a comprehensive set of information about their network storage so that they can determine the best means of addressing their storage content. When organizations know what files are being stored, where they are stored, when they were last accessed, how many versions of a file exist, etc., they are better informed to make decisions about where to store ...

April 2010-
Organizations need to better track and understand storage patterns, allocate and manage storage based on its relevance and value to the business, while saving money in the administration and procurement of storage resources. Learn how a commercial software tool helps unlock the hidden value in collaborative data—such as presentations, text documents, spreadsheets and videos — the primary output of employee creativity and the fastest consumer of enterprise storage today.

April 2010-
The release of the 2009 Consensus Audit Guidelines (CAG) outlines the need for federal cyber-security controls that are tacitly proactive and can “inform defense” of actual attacks that have compromised systems, or those that could transpire to do so.

This white paper explores specific directives of the CAG, and highlights a commercial software application that arms government agencies and their private-sector partners with the tools to perform ongoing penetration testing of web applications, network ...

April 2010-
In this white paper, government agencies learn about new provisions added to the Guide for Assessing Controls in Federal Information Systems (NIST SP 800-53A), and how a new commercial software tool addresses these provisions with penetration testing that identifies and assesses critical vulnerabilities existing across networks, endpoints and web applications.

March 2010-
The Obama Administration’s FY2010 budget guidelines reignited questions about how agencies can best comply with evolving OMB mandates for when to insource or outsource federal contracts. A new white paper by PITSS America explains how even in the absence of clear rules agencies can develop a “rightsizing” approach that takes advantage of solutions like PITSS.converter. The application delivers a clear ROI for Oracle Forms and Reports migrations that can save typical agencies hundreds ...

March 2010-
Developing high-quality, successful A&D products and programs–on time and within budget–has always been a tremendous challenge for organizations serving the A&D industry. Yet today, due to the economic downturn, globalization, product sophistication, and the emergence of powerful new technologies, the level of complexity in A&D product development is becoming mind-boggling. A&D companies are up against numerous obstacles including Complex Products, Complex Design and Supplier Networks, and Complex Economic Times.

January 2009-
You’ve created a great database application. It has an easy to use and intuitive user interface. All of the information that anyone could hope for is being stored in the database. Yet, your users still aren’t happy. Why? In a recent survey one of the world’s largest accounting and CRM software manufacturers asked their customers "What if anything would you like to see us improve in our applications?" Over 50% of the respondents ...

November 2009-
Government departments and regional authorities around the world are under pressure to achieve the improbable; of delivering improvements in the quality of services to citizens while finding sizeable cashable efficiency savings. The IT function is in the front-line of achieving both of these desired outcomes. With advances in enterprise mashups, new opportunities exist in government IT today for dramatic cost reductions and growth innovation fueled by online data capture, social networking, collaboration, process optimisation, mobility, ...

October 2009-
Shadow systems consist of small-scale databases or spreadsheets developed and used by end users outside the direct control of an organization's IT department. Many companies have started to experience the consequences of non-existent, insufficient, or poorly implemented data security plans. The absence of proper IT to serve the diversity of information management, analysis, and human-centric workflow requirements that exist in the office has created a paucity of unsecured business-critical information held in spreadsheets and micro-databases ...

November 2008-
APM is one of the best tools for evaluating, balancing, and enhancing the value of application portfolios and supporting fact-based decision making. This white paper provides a framework for implementing an APM program that will enable your organization to monitor and analyze the impact of technology and application changes; align changing business and technology objectives; reduce portfolio complexity and cost of ownership; and increase return on portfolio investment and performance.